Skip to Content

Research Proposal

Add your abstract and contact information and we will be in touch

Thanks We will be in touch soon

Contact us

Leave a massage and we’ll get back to you

You can also reach us at:

Cyber Security Research Center @ Ben-Gurion University of the Negev
P.O.B. 653
Beer Sheva, 84105,
Israel

+972 8 6428005
+972 8 6428121
cyber-labs bgu.ac.il

Detection of malicious webmail attachments based on propagation patterns

Yehonatan Cohen, Danny Hendler, Amir Rubin

Knowledge-Based Systems Volume 141, 1 February 2018, Pages 67-79

Email remains one of the key media used by cybercriminals for distributing malware. Based on a large data set consisting of antivirus telemetry reports, we conduct the first comprehensive study of the properties of malicious webmail attachments. We show that they are distinct among the general web-borne malware population in terms of the malware reach (the number of machines to which the malware is downloaded), malware type and family. Furthermore, we show that malicious webmail attachments are unique in the manner in which they propagate through the network.

We leverage these findings for defining novel features of malware propagation patterns. These features are derived from a time-series representation of malware download rates and from the community structure of graphs that model the network paths through which malware propagates. Based on these features, we implement a detector that provides high-quality detection of malicious webmail attachments.

Back to top
Font Resize
Contrast